Received: by 2002:ac0:946b:0:0:0:0:0 with SMTP id j40csp2338065imj; Mon, 11 Feb 2019 00:46:10 -0800 (PST) X-Google-Smtp-Source: AHgI3IYSd5KY9yDfxrKMatDOt4pC6/N88QccmYlLbhnfPRSn+ELLE0vOgilef00vROm9+ch3WQl+ X-Received: by 2002:a63:4342:: with SMTP id q63mr32863591pga.63.1549874770842; Mon, 11 Feb 2019 00:46:10 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1549874770; cv=none; d=google.com; s=arc-20160816; b=f4SlfBfRe0vHwbt051uAAJtPWctYFwEztUnH/9gFLD+FObU+f8t7BDNjHpEwKc+cmm B86TLo7W1e/pxuFck72Mn03l/BDzS6b/TQvbYkTqNLh1hCrjlDCekjA/1K7IPeU+tGl4 yaP1wcQj4cQO+7jHL7cpWksSBD1P3lSdOTmCenHaktd1EM7cPnK3rIsXe6Mtg7q2kdhI lQZLDdZsoLf9DbSIbVa4n3i8RsfOWTwkUN4GvZwr5BULvhm2a+Ph0s/3o2B7bJe4ageG xIKTgqtJqM2lrBbmguqqAfYQ/+TRQLGBU4HobvOu6T7+IzhCJRssIcmfG5R2CYtNdMZy STtw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version:dkim-signature; bh=aNjOHNDg94ZkKvA1xr9xCksj4QuuBPIf/hPN1+P9Vu4=; b=q4R2LaTInrdZQSnTcmGU9XodgHwGg15A1R8Yi2zI/x68+zCZvl/NmwepssP/JfaVqw 9Gu2pMD9EDpzX0sIv+YUVBksJdIVYA5zmQRkQJWBAM56dbLIHCHiyyCv3QIQrqSbhKkF IhWtgjfZrWDM+G+Ur66tMvzLizaDj09MJakY4A3y7Kfvq9IiBjdHmbU4CwbhTiuHXD3a FoJ8w9iaFn5HQiRPI5zKjTEALQGCtRyMOyJWbO2RlXJbm0gDgj9ibXtrOxSlBVbwm0Rt ++anEYNruwz5/VhVRswFdVbI3jP+03kmsiuGkdmoBXZRcqdzE/xr4gX07FOs/kEYcxWg zFLw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=wX2AA0uS; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id h17si1501241pgv.438.2019.02.11.00.45.55; Mon, 11 Feb 2019 00:46:10 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=wX2AA0uS; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727176AbfBKIpp (ORCPT + 99 others); Mon, 11 Feb 2019 03:45:45 -0500 Received: from mail.kernel.org ([198.145.29.99]:35996 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1725931AbfBKIpo (ORCPT ); Mon, 11 Feb 2019 03:45:44 -0500 Received: from mail-lj1-f179.google.com (mail-lj1-f179.google.com [209.85.208.179]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 98FF52173C; Mon, 11 Feb 2019 08:45:43 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1549874743; bh=aNjOHNDg94ZkKvA1xr9xCksj4QuuBPIf/hPN1+P9Vu4=; h=References:In-Reply-To:From:Date:Subject:To:Cc:From; b=wX2AA0uS56qLBfOdFDt+r/4X2GOU8Vf/rOr7bs38Pasr2nOruy3VQ5TXmUl9oDrOM xPF/hDpnw4A/dv11LaXtqMxLPDcDgg5h4y4hJDMpf+mMn1LNA2oSxf/Ord6SlnNjiI VzQASpXz0W9d+Dojai2X79ALMYO3rKescBCL18TY= Received: by mail-lj1-f179.google.com with SMTP id r10-v6so8027583ljj.4; Mon, 11 Feb 2019 00:45:43 -0800 (PST) X-Gm-Message-State: AHQUAuaXy6v3CXGFfq+Zq5DNcqlJ90CPetNwKv52rArPyaN6CaDcisrg Qq6DRWMf22F/gdN5N8+FeZUGQv5B9CsMlrDlOVI= X-Received: by 2002:a2e:81da:: with SMTP id s26-v6mr21000889ljg.183.1549874741764; Mon, 11 Feb 2019 00:45:41 -0800 (PST) MIME-Version: 1.0 References: <20190210225114.20110-1-stuart.menefy@mathembedded.com> In-Reply-To: <20190210225114.20110-1-stuart.menefy@mathembedded.com> From: Krzysztof Kozlowski Date: Mon, 11 Feb 2019 09:45:30 +0100 X-Gmail-Original-Message-ID: Message-ID: Subject: Re: [PATCH 0/2] Subject: [PATCH 0/2] clocksource: exynos_mct: Clear timer interrupt when shutting down To: Stuart Menefy Cc: "linux-samsung-soc@vger.kernel.org" , Daniel Lezcano , Thomas Gleixner , Kukjin Kim , linux-kernel@vger.kernel.org, linux-arm-kernel@lists.infradead.org Content-Type: text/plain; charset="UTF-8" Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Sun, 10 Feb 2019 at 23:51, Stuart Menefy wrote: > > When debugging suspend problems on Exynos 5260, I had a large number > of debugging prints going to the serial port after interrupts > had been disabled but before the timer interrupt was shutdown. This > was long enough for a timer tick to occur, but as interrupts were > disabled the ISR didn't run, and so the interrupt wasn't cleared. > Later when the timer was shutdown the interrupt was left asserted and > so the wfi at the heart of the suspend code didn't wait, causing > the suspend to fail. > > Currently the code which stops the timer when it is on one-shot mode > and the interrupt occurs is in exynos4_mct_tick_clear(), meaning if we > called this from the shutdown code exynos4_mct_tick_stop() could be > called twice. So first restructure the existing code, so the check for > one-shot mode and stopping the timer is moved to the ISR, leaving > exynos4_mct_tick_clear() just clearing the interrupt flag. > > Once this has been done simply call exynos4_mct_tick_clear() from > set_state_shutdown(). For sending the corrected version. This is second revision of the patchset so please remember to add v2 to the title and changelog in cover letter. v2 can be easily added with format-patch (-v2). Best regards, Krzysztof